Microsoft Excel 2010
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R8). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 47 rules matched cleanly.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO104 - Excel
- Vuln IDs
-
- V-17173
- Rule IDs
-
- SV-33402r1_rule
Checks: C-33886r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” must be “Enabled” and a check in the ‘excel.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29574r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Disable user name and password” to “Enabled” and place a check in the ‘excel.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO111 - Excel
- Vuln IDs
-
- V-17174
- Rule IDs
-
- SV-33388r1_rule
Checks: C-33871r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” must be “Enabled” and a check in the ‘excel.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SAFE_BINDTOOBJECT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29560r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Bind to Object” to “Enabled” and place a check in the ‘excel.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO117 - Excel
- Vuln IDs
-
- V-17175
- Rule IDs
-
- SV-33416r1_rule
Checks: C-33899r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” must be “Enabled” and a check in the ‘excel.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_UNC_SAVEDFILECHECK Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29588r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Saved from URL” to “Enabled” and place a check in the ‘excel.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO123 - Excel
- Vuln IDs
-
- V-17183
- Rule IDs
-
- SV-33409r1_rule
Checks: C-33892r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘excel.exe’ check box must be present. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29581r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘excel.exe’ check box.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO129 - Excel
- Vuln IDs
-
- V-17184
- Rule IDs
-
- SV-33393r1_rule
Checks: C-33877r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” must be “Enabled” and ‘excel.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29566r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Block popups” to “Enabled” and select ‘excel.exe’.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO131 - Excel
- Vuln IDs
-
- V-17187
- Rule IDs
-
- SV-33442r1_rule
Checks: C-33925r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” must be “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-29614r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Disable Trust Bar Notification for unsigned application add-ins and block them” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO210 - Excel
- Vuln IDs
-
- V-17322
- Rule IDs
-
- SV-33448r1_rule
Checks: C-33931r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters “Block opening of pre-release versions of file formats new to Excel 2010 through the Compatibility Pack for Office 2010 and Excel 2010 Converter” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value Excel12BetaFilesFromConverters is REG_DWORD = 1, this is not a finding.
Fix: F-29620r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Office 2010 Converters “Block opening of pre-release versions of file formats new to Excel 2010 through the Compatibility Pack for Office 2010 and Excel 2010 Converter” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO133 - Excel
- Vuln IDs
-
- V-17471
- Rule IDs
-
- SV-33447r1_rule
Checks: C-33930r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\trusted locations Criteria: If the value AllLocationsDisabled is REG_DWORD = 1, this is not a finding.
Fix: F-29619r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Trusted Locations “Disable all trusted locations” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO142 - Excel
- Vuln IDs
-
- V-17473
- Rule IDs
-
- SV-33441r1_rule
Checks: C-33924r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Scan encrypted macros in Excel Open XML workbooks” must be “Enabled: Scan encrypted macros (default)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value ExcelBypassEncryptedMacroScan is REG_DWORD = 0, this is not a finding.
Fix: F-29613r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Scan encrypted macros in Excel Open XML workbooks” to “Enabled: Scan encrypted macros (default)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO134 - Excel
- Vuln IDs
-
- V-17520
- Rule IDs
-
- SV-33446r1_rule
Checks: C-33929r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations on the network" must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\trusted locations Criteria: If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-29618r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Trusted Locations “Allow Trusted Locations on the network" to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO139 - Excel
- Vuln IDs
-
- V-17521
- Rule IDs
-
- SV-33437r1_rule
Checks: C-33920r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save "default file format" must be set to "Enabled (Excel Workbook *.xlsx)". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options Criteria: If the value DefaultFormat is REG_DWORD = 0x00000033(hex) or 51 (Decimal), this is not a finding.
Fix: F-29609r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save "default file format" to "Enabled (Excel Workbook *.xlsx)".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO146 - Excel
- Vuln IDs
-
- V-17522
- Rule IDs
-
- SV-33444r1_rule
Checks: C-33927r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Trust access to Visual Basic Project” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value AccessVBOM is REG_DWORD = 0, this is not a finding.
Fix: F-29616r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Trust access to Visual Basic Project” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO304 - Excel
- Vuln IDs
-
- V-17545
- Rule IDs
-
- SV-33445r1_rule
Checks: C-33928r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “VBA Macro Notification Settings” must be “Enabled: Disable all with notification". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value VBAWarnings is REG_DWORD = 2, this is not a finding.
Fix: F-29617r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “VBA Macro Notification Settings” to “Enabled: Disable all with notification".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO143 - Excel
- Vuln IDs
-
- V-17621
- Rule IDs
-
- SV-33440r1_rule
Checks: C-33923r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Force file extension to match file type” must be set to “Enabled (Allow different, but warn)”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value ExtensionHardening is REG_DWORD = 1, this is not a finding.
Fix: F-29612r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Force file extension to match file type” to “Enabled (Allow different, but warn)”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO138 - Excel
- Vuln IDs
-
- V-17650
- Rule IDs
-
- SV-33436r1_rule
Checks: C-33919r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Proofing -> Autocorrect Options “Internet and network paths as hyperlinks” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options If the value AutoHyperlink is REG_DWORD = 0, this is not a finding.
Fix: F-29608r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Proofing -> Autocorrect Options “Internet and network paths as hyperlinks” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO140 - Excel
- Vuln IDs
-
- V-17652
- Rule IDs
-
- SV-33438r1_rule
Checks: C-33921r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save “Disable AutoRepublish” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options Criteria: If the value DisableAutoRepublish is REG_DWORD = 1, this is not a finding.
Fix: F-29610r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save “Disable AutoRepublish” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO150 - Excel
- Vuln IDs
-
- V-17732
- Rule IDs
-
- SV-33434r1_rule
Checks: C-33917r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Advanced “Ask to update automatic links” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options\binaryoptions Criteria: If the value fUpdateExt_78_1 is REG_DWORD = 0, this is not a finding.
Fix: F-29606r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Advanced “Ask to update automatic links” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO141 - Excel
- Vuln IDs
-
- V-17744
- Rule IDs
-
- SV-33439r1_rule
Checks: C-33922r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save “Do not show AutoRepublish warning alert” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options Criteria: If the value DisableAutoRepublishWarning is REG_DWORD = 0, this is not a finding.
Fix: F-29611r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Save “Do not show AutoRepublish warning alert” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO152 - Excel
- Vuln IDs
-
- V-17751
- Rule IDs
-
- SV-33435r1_rule
Checks: C-33918r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Advanced -> Web Options -> General “Load pictures from Web pages not created in Excel” must be set to “Disabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\internet Criteria: If the value DoNotLoadPictures is REG_DWORD = 1, this is not a finding.
Fix: F-29607r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Advanced -> Web Options -> General “Load pictures from Web pages not created in Excel” to “Disabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO145 - Excel
- Vuln IDs
-
- V-17804
- Rule IDs
-
- SV-33443r1_rule
Checks: C-33926r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Store macro in Personal Macro Workbook by default” must be set to “Enabled”. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options\binaryoptions Criteria: If the value fGlobalSheet_37_1 is REG_DWORD = 1, this is not a finding.
Fix: F-29615r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Store macro in Personal Macro Workbook by default” to “Enabled”.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO126 - Excel
- Vuln IDs
-
- V-26584
- Rule IDs
-
- SV-33780r1_rule
Checks: C-34156r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” must be set to “Enabled” and ‘excel.exe’ is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29845r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Add-on Management” to “Enabled” and ‘excel.exe’ is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO209 - Excel
- Vuln IDs
-
- V-26585
- Rule IDs
-
- SV-33785r1_rule
Checks: C-34162r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” must be set to “Enabled” and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ZONE_ELEVATION Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29851r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Protection From Zone Elevation” to “Enabled” and 'excel.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO211 - Excel
- Vuln IDs
-
- V-26586
- Rule IDs
-
- SV-33791r1_rule
Checks: C-34167r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” must be set to “Enabled” and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_ACTIVEXINSTALL Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29856r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict ActiveX Install” to “Enabled” and 'excel.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO132 - Excel
- Vuln IDs
-
- V-26587
- Rule IDs
-
- SV-33798r1_rule
Checks: C-34172r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” must be set to “Enabled” and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_RESTRICT_FILEDOWNLOAD Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29861r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Restrict File Download” to “Enabled” and 'excel.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO124 - Excel
- Vuln IDs
-
- V-26588
- Rule IDs
-
- SV-33803r1_rule
Checks: C-34177r1_chk
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” must be set to “Enabled” and 'excel.exe' is checked. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS Criteria: If the value excel.exe is REG_DWORD = 1, this is not a finding.
Fix: F-29866r1_fix
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Scripted Window Security Restrictions” to “Enabled” and 'excel.exe' is checked.
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO127 - Excel
- Vuln IDs
-
- V-26589
- Rule IDs
-
- SV-33850r1_rule
Checks: C-34192r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” must be set to “Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix: F-29886r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Require that application add-ins are signed by Trusted Publisher” to “Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO128 - Excel
- Vuln IDs
-
- V-26590
- Rule IDs
-
- SV-33855r1_rule
Checks: C-34193r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix: F-29887r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO118 - Excel
- Vuln IDs
-
- V-26591
- Rule IDs
-
- SV-34625r1_rule
Checks: C-34190r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Data Recovery “Do not show data extraction options when opening corrupt workbooks” must be set to “Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\options Criteria: If the value ExtractDataDisableUI is REG_DWORD = 1, this is not a finding.
Fix: F-29883r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Data Recovery “Do not show data extraction options when opening corrupt workbooks” to “Enabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO119 - Excel
- Vuln IDs
-
- V-26592
- Rule IDs
-
- SV-33874r1_rule
Checks: C-34191r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Turn off file validation” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\filevalidation Criteria: If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-29884r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security “Turn off file validation” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO122 - Excel
- Vuln IDs
-
- V-26595
- Rule IDs
-
- SV-34230r1_rule
Checks: C-34194r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “dBase III / IV files” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value DBaseFiles is REG_DWORD = 2, this is not a finding.
Fix: F-29888r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “dBase III / IV files” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO112 - Excel
- Vuln IDs
-
- V-26596
- Rule IDs
-
- SV-34238r1_rule
Checks: C-34195r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Dif and Sylk files” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value DifandSylkFiles is REG_DWORD = 2, this is not a finding.
Fix: F-29889r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Dif and Sylk files” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO113 - Excel
- Vuln IDs
-
- V-26597
- Rule IDs
-
- SV-34239r1_rule
Checks: C-34196r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 2 macrosheets and add-in files” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL2Macros is REG_DWORD = 2, this is not a finding.
Fix: F-29890r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 2 macrosheets and add-in files” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO114 - Excel
- Vuln IDs
-
- V-26598
- Rule IDs
-
- SV-34253r1_rule
Checks: C-34197r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 2 worksheets” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL2Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-29891r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 2 worksheets” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO115 - Excel
- Vuln IDs
-
- V-26599
- Rule IDs
-
- SV-34255r1_rule
Checks: C-34198r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 3 macrosheets and add-in files” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL3Macros is REG_DWORD = 2, this is not a finding.
Fix: F-29892r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 3 macrosheets and add-in files” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO116 - Excel
- Vuln IDs
-
- V-26601
- Rule IDs
-
- SV-34259r1_rule
Checks: C-34199r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 3 worksheets” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL3Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-29893r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 3 worksheets” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO105 - Excel
- Vuln IDs
-
- V-26607
- Rule IDs
-
- SV-34269r1_rule
Checks: C-34200r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 macrosheets and add-in files” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL4Macros is REG_DWORD = 2, this is not a finding.
Fix: F-29894r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 macrosheets and add-in files” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO106 - Excel
- Vuln IDs
-
- V-26608
- Rule IDs
-
- SV-34272r1_rule
Checks: C-34201r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 workbooks” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL4Workbooks is REG_DWORD = 2, this is not a finding.
Fix: F-29895r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 workbooks” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO107 - Excel
- Vuln IDs
-
- V-26609
- Rule IDs
-
- SV-34275r1_rule
Checks: C-34202r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 worksheets” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL4Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-29896r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 4 worksheets” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO108 - Excel
- Vuln IDs
-
- V-26610
- Rule IDs
-
- SV-34277r2_rule
Checks: C-34203r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 95 workbooks” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value XL95Workbooks is REG_DWORD = 5, this is not a finding.
Fix: F-29897r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 95 workbooks” to “Enabled: Allow editing and open in Protected View".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO109 - Excel
- Vuln IDs
-
- V-26611
- Rule IDs
-
- SV-34279r2_rule
Checks: C-34204r2_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 95-97 workbooks and templates” must be “Enabled: Allow editing and open in Protected View". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\14.0\excel\security\fileblock Criteria: If the value XL9597WorkbooksandTemplates is REG_DWORD = 5, this is not a finding.
Fix: F-29898r2_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Excel 95-97 workbooks and templates” to “Enabled: Allow editing and open in Protected View".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO110 - Excel
- Vuln IDs
-
- V-26612
- Rule IDs
-
- SV-33872r1_rule
Checks: C-34205r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” must be “Enabled: Blocked files are not opened". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-29899r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Set default file block behavior” to “Enabled: Blocked files are not opened".
- RMF Control
- Severity
- L
- CCI
- Version
- DTOO120 - Excel
- Vuln IDs
-
- V-26613
- Rule IDs
-
- SV-34282r2_rule
Checks: C-34206r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Web pages and Excel 2003 XML spreadsheets” must be “Enabled: Open/Save blocked, use open policy". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\fileblock Criteria: If the value HtmlandXmlssFiles is REG_DWORD = 2, this is not a finding.
Fix: F-29900r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> File Block Settings “Web pages and Excel 2003 XML spreadsheets” to “Enabled: Open/Save blocked, use open policy".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO121 - Excel
- Vuln IDs
-
- V-26614
- Rule IDs
-
- SV-33861r1_rule
Checks: C-34207r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Do not open files from the Internet zone in Protected View” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\protectedview Criteria: If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29901r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Do not open files from the Internet zone in Protected View” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO288 - Excel
- Vuln IDs
-
- V-26615
- Rule IDs
-
- SV-33864r1_rule
Checks: C-34208r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Do not open files in unsafe locations in Protected View” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\protectedview Criteria: If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29902r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Do not open files in unsafe locations in Protected View” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO292 - Excel
- Vuln IDs
-
- V-26616
- Rule IDs
-
- SV-33867r1_rule
Checks: C-34211r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Set document behavior if file validation fails” must be "Enabled: Open in Protected View" and Unchecked for "Do not allow edit". Procedure: Use the Windows Registry Editor to navigate to the following keys: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\filevalidation Criteria: If the value OpenInProtectedView is REG_DWORD = 1, this is not a finding. AND HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\filevalidation Criteria: If the value DisableEditFromPV is REG_DWORD = 1, this is not a finding.
Fix: F-29903r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Set document behavior if file validation fails” to "Enabled: Open in Protected View" and Unchecked for "Do not allow edit".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO293 - Excel
- Vuln IDs
-
- V-26617
- Rule IDs
-
- SV-33870r1_rule
Checks: C-34212r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Turn off Protected View for attachments opened from Outlook” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\excel\security\protectedview Criteria: If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-29904r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Excel 2010 -> Excel Options -> Security -> Trust Center -> Protected View “Turn off Protected View for attachments opened from Outlook” to “Disabled".
- RMF Control
- Severity
- M
- CCI
- Version
- DTOO305 - Excel
- Vuln IDs
-
- V-26625
- Rule IDs
-
- SV-33809r1_rule
Checks: C-34183r1_chk
The policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” must be “Enabled" and "Disallow in Excel" selected. Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\common\toolbars\excel Criteria: If the value NoExtensibilityCustomizationFromDocument is REG_DWORD = 1, this is not a finding.
Fix: F-29872r1_fix
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Office 2010 -> Global Options -> Customize “Disable UI extending from documents and templates” to “Enabled" and select "Disallow in Excel".